In various articles I wrote on the large diffusion of botnets and the capabilities of malicious agents to use as spread channel the social media platforms or popular applications. The diffusion and management of a botnet architecture has never been so easy, the underground offer covers every need and provides advanced customization services. Security expert […]
Recently I wrote an article related the link between the soar of Bicoin value and expected increased interest of cybercrime to the virtual currency. In the post I anticipated the we will assist to the increase of DDoS attacks and data breach against principal Bitcoin exchanges and services providers, I also introduced the possibility to […]
FireEye is one of most interesting security companies, thanks to its investigations many cases have been discovered in the last months, such as the attack to Bit9 companies and the abuse of its certificate to sign malicious code. The security firm has just published a new interesting report titled “2H 2012 Advanced Threat Report” reporting […]
Botnet author are increasing complexity of the malicious code they use and at the same time security firms are adopting more sophisticated detection methods. Between principal concerns of botmaster the need to improve the capabilities of bot agents to operate silently and necessity to masquerade traffic from bots and Command & Control servers. Focusing on this […]
The principal reports proposed by various security firm demonstrate a sustained growth of cyber criminal activities fueled by increased offer of underground. In the underground it is practically possible to acquire/sell any kind of product and services to realize illegal activities. The offer is complete and include programming and hacking services, bulletproof-hosting services, cyber attacks on […]
Read about APT attacks has become customary, even easier to hear of attacks against political dissidents or minorities as Tibetan and Uyghur activists, but never before has been exploited the Android platform for this type of offensive. In the past Tibetan minorities have been already targeted with malware able to infect Windows and Mac OSs, […]
Recently South Korea has been hit by powerful cyber attack malware based, network provided by LG UPlus Corp was hacked by a group calling itself the “Whois Team”. The attack targeted also media and banking of the country, television networks YTN, MBC and KBS and Shinhan Bank and NongHyup Bank, two major banks of the […]
Last week was monopolized by the discussion on cyber attacks that hit North and South Korea, but I found a news equally stunning, researchers at Hungary-based CrySyS Lab have discovered a decade-long cyber espionage campaign that targeted high-level political and industrial entities in Eastern Europe. The attackers, dubbed by security researchers TeamSpy, used the popular remote-access […]
Recent cyber attacks against North and South Korea are inflaming the debate on the importance of cyber security, governments are massively investing in the improvement of cyber capabilities to be prepared to mitigate the increasing number of offensives. China is considered the most aggressive state, according principal security firms and cyber experts, from its country […]
Many times we discussed about the fact that FinFisher was discovered in the wild, the use of popular spyware has been abused by governments and intelligence agencies all around the world. The spyware is for law enforcement and government use, but it seems to be preferred for those regimes that desire to monitor representatives of the […]